Breaking News Emails

Get breaking news alerts and special reports. The news and stories that matter, delivered weekday mornings.
 / Updated  / Source: CNBC.com
By Arjun Kharpal, CNBC

Hackers are taking advantage of vulnerability in Apple's iOS mobile operating system to install malicious software disguised as popular apps such as Facebook, Twitter and WhatsApp to steal personal information.

The installation happens when a user clicks a link that may have been sent to them via email, text message or even a fake advertisement on a website, according to a new report by cybersecurity firm FireEye.

A fake and malicious app is installed that looks like the legitimate version on a user's device. And unlike the normal version of the app, the hacker's version can steal sensitive information and send it back to a remote server.

"It can look at the historical data that app might have saved depending on the type of app," Simon Mullis, global technical lead at FireEye, told CNBC.

"For a corporate user, it could be catastrophic if hackers get insight into internal negotiations and corporate crown jewels at risk."

WhatsApp, Twitter, Facebook, Facebook Messenger, WeChat, Google Chrome, Viber, Blackberry Messenger, Skype, Telegram, and VK are the apps being used for malicious purposes, according to FireEye.

Read More from CNBC: 5 Billion Android Apps Open to Hack

The hack could potentially be used on different mobile operating systems but so far FireEye has only seen it employed on iOS version 8.1.3 and before. This particular hack also works on iOS devices that haven't been modified to bypass certain restrictions imposed by Apple -- which were typically seen as safe from attack.

This attack was discovered from the 400GB worth of files leaked when an Italian company that sells surveillance technology to governments was hacked last month.

The data dump from Hacking Team is likely to lead to more severe attacks, according to FireEye, which many are not prepared for.

"It is a glimpse under the water to see the rest of the iceberg," Mullis said.

"You can be sure that not only are there major institutions currently breached and that don't know about it, but there are other groups using attacks against end users."